Sciweavers

337 search results - page 33 / 68
» On Weak Markov's Principle
Sort
View
CASSIS
2004
Springer
14 years 1 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
DATE
2003
IEEE
75views Hardware» more  DATE 2003»
14 years 28 days ago
Self-Testing Embedded Checkers for Bose-Lin, Bose, and a Class of Borden Codes
—A new approach for designing t-UED and BUED code checkers is presented. In particular we consider Borden codes for t = 2k − 1, Bose and Bose-Lin codes. The design technique fo...
Steffen Tarnick
CCA
2000
Springer
14 years 3 hour ago
A Computable Spectral Theorem
Computing the spectral decomposition of a normal matrix is among the most frequent tasks to numerical mathematics. A vast range of methods are employed to do so, but all of them su...
Martin Ziegler, Vasco Brattka
KBSE
1998
IEEE
13 years 12 months ago
A Visualization Concept for Hierarchical Object Models
Most current object modeling methods and tools have weaknesses both in the concepts of hierarchical decomposition and in the visualization of these hierarchies. Some methods do no...
Stefan Berner, Stefan Joos, Martin Glinz, Martin A...
PEPM
1998
ACM
13 years 12 months ago
Inherited Limits
We show the evolution of partial evaluators over the past ten years from a particular perspective: the attempt to remove limits on the structure of residual programs that are inher...
Torben Æ. Mogensen